Geeks With Blogs
ex-blog Information security world March 2004 Entries
Dynamic Systems Initiative Overview
MS posted DSI overview whitepaper for download: The Dynamic Systems Initiative (DSI) is a Microsoft and industry effort to enhance the Microsoft® Windows® platform and deliver a coordinated set of solutions that dramatically simplify and automate how businesses design, deploy, and operate distributed systems ......

Posted On Wednesday, March 31, 2004 8:03 AM

FxCop 1.30 released
FxCop 1.30 has been released.Download @ http://www.gotdotnet.com/te... The security rules index for FxCop can be found @ http://www.gotdotnet.com/te... [from Anil John's blog] ......

Posted On Tuesday, March 30, 2004 10:09 AM

Patching vs. Intrusion Prevention
Dana Epp posted good comparision of pros and cons of patching and intrusion prevention: Lets get real. The reality is BOTH are right, and BOTH are wrong for different reasons. Lets look at this from an infosec point of view while understanding the mindset of an administrator responsible for the critical infrastructure of an organization. At last security session in Moscow that Cisco presented: Cisco presentation (from my understaing of point of view of presenters) was intrusion prevention centric ......

Posted On Tuesday, March 30, 2004 10:04 AM

PortQry and Port Reporter documentation
MS Support posted two articles: New features and functionality in PortQry version 2.0 about command-line utility PortQry that can be used to help troubleshoot TCP/IP connectivity issues and Availability and description of the Port Reporter tool about service/tool that logs TCP and UDP port activity (Michael Howard mention it in his last post, BTW read Keith Brown comment about it. Update: Tim Rains updated tool and article). Update [03.08.2004] John posted in comments that Tim Rains also released ......

Posted On Thursday, March 18, 2004 5:14 PM

.NET delay signing in details
Shawn Farkas posted note about delay signing in CLR: Delay signed assemblies serve to increase security in development shops, by reducing the number of people that need access to an organization's private keys. However, the requirement that delay signed assemblies need to be registered in the skip verification list means that developers machines are open to various forms of attack. Making sure that your developers are aware of the situation, in combination with not overusing your skip verification ......

Posted On Thursday, March 18, 2004 8:57 AM

Windows Update Services
SUS 2 beta supports Exchange Servers, but final version is approaching: “Windows Update Services (WUS) is the new name for the next version of the update management solution currently known as Software Update Services (SUS). Windows Update Services will support updating Windows®, Office, SQL Server™, and other Microsoft products and will provide significantly expanded capabilities over SUS” Windows Update Services is still in beta now and more information on it can be found ......

Posted On Wednesday, March 17, 2004 8:25 AM

Security events in Moscow
I'm going to attend Cisco Secure Tour 5 in Moscow (23 March) and Microsoft Developers Days 2004. Secure Code in Moscow (2 april). See you there ;-)! Updated: comments in Russian at securitylab.ru ......

Posted On Wednesday, March 17, 2004 8:15 AM

Mono XML Signature implementation
Sébastien Pouliot updated information about XMLDSig in Mono. He has interesting results in interop with Merlin's tests (and seems Mono is implemented with Aleksey's xmlsec C14N). May be we should also use Aleksey's work to support other algorithms in XMLDSig.

Posted On Wednesday, March 17, 2004 8:08 AM

Exploiting Software : How to Break Code book
Exploiting Software : How to Break Code by Greg Hoglund and Gary McGraw How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, ......

Posted On Monday, March 15, 2004 8:07 AM

Application Security Assurance slide deck
Microsoft has released a slide deck and white paper on their Application Security Assurance Program. Microsoft founded the Application Security Assurance Program (ASAP) to inventory, assess, and-when necessary-ensure resolution of security vulnerability issues found in line-of-business applications. Topics include the program's criteria for assessing applications, the participants in the review process, the requirements for a secure application environment, lessons learned while evaluating applications ......

Posted On Friday, March 12, 2004 8:12 AM

Application Security
Craig McMurtry posted several articles about Application Security. We are working with AD/AM and very pleased with it scalability and extendability (schema and so on)

Posted On Thursday, March 4, 2004 3:53 PM

Amazon Syndicated Content
Amazon recently turned on RSS feeds [via Scoble]

Posted On Thursday, March 4, 2004 2:18 PM

Protect Yourself Against Kerberos Attacks
Excerpt from new O'Reilly book: Editor's note: Based on the principle that the only way to defend yourself is to understand your attacker in-depth, the recently released Security Warrior reveals how your Windows and UNIX systems can be attacked. It covers everything from reverse engineering to SQL attacks, and including topics like social engineering, anti-forensics, and common attacks against Windows systems. This week we've excerpted a sample from the book about Kerberos attacks ......

Posted On Thursday, March 4, 2004 1:59 PM

Microsoft Technology Centers Showcase Smart Cards
Microsoft Corp. plans to demonstrate how smart cards can help secure computer networks at its technology centers in six countries this year. "We include smart cards in the demo because for many customers the benefits are not understood," Brian Groth, group program manager for Microsoft Technology Centers, tells Card Technology. [more on bink] So Microsoft is supporting both RSA SecurId and smartcards - smart move toward better security (password is dead =) ......

Posted On Thursday, March 4, 2004 1:57 PM

Exchange Edge Services and UNIX with AD2003
Microsoft posted technical Exchange Edge Services Overview and version 0.9 of Building Security and Directory Solutions for UNIX Using the Windows Server 2003 Active Directory Kerberos and LDAP Services. Worth attention.

Posted On Thursday, March 4, 2004 1:52 PM

Copyright © John Doe | Powered by: GeeksWithBlogs.net